Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

A survey on network security for cyber–physical systems: From threats to resilient design

S Kim, KJ Park, C Lu - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are considered the integration of physical systems in the real
world and control software in computing systems. In CPS, the real world and the computing …

Lightweight cryptography system for IoT devices using DNA

MAF Al-Husainy, B Al-Shargabi… - Computers and Electrical …, 2021 - Elsevier
Many lightweight encryption algorithms have been developed for tackling the limitations of
resources on the Internet of Things (IoT) devices. Such devices have limited processing …

A survey on nist selected third round candidates for post quantum cryptography

T Hasija, KR Ramkumar, A Kaur… - 2022 7th International …, 2022 - ieeexplore.ieee.org
The tremendous increase in the volume of data over internet for many applications such as
banking, hospitals, insurance, online trading, messengers, voice communications and …

RISC-V instruction set extensions for lightweight symmetric cryptography

H Cheng, J Großschädl, B Marshall, D Page… - IACR Transactions on …, 2023 - tches.iacr.org
Abstract The NIST LightWeight Cryptography (LWC) selection process aims to standardise
cryptographic functionality which is suitable for resource-constrained devices. Since the …

Discussion on a new paradigm of endogenous security towards 6G networks

X Ji, J Wu, L Jin, K Huang, Y Chen, X Sun… - Frontiers of Information …, 2022 - Springer
The sixth-generation mobile communication (6G) networks will face more complex
endogenous security problems, and it is urgent to propose new universal security theories …

Hardware constructions for error detection in lightweight authenticated cipher ASCON benchmarked on FPGA

J Kaur, MM Kermani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Lightweight cryptography plays a vital role in securing resource-constrained embedded
systems such as deeply-embedded systems, RFID tags, sensor networks, and the Internet of …

Analysis of ascon, drygascon, and shamash permutations

C Tezcan - International Journal of Information Security Science, 2020 - dergipark.org.tr
Ascon, DryGASCON, and Shamash are submissions to NIST's lightweight cryptography
standardization process and have similar designs. We analyze these algorithms against …

Security threats and cryptographic protocols for medical wearables

L Hernández-Álvarez, JJ Bullón Pérez, FK Batista… - Mathematics, 2022 - mdpi.com
In the past few years, the use of several medical devices is increasing. This paper will pay
attention to a device developed to get measures of the temperature of diabetic foot. These …

An enhanced lightweight speck system for cloud-based smart healthcare

M AbdulRaheem, GB Balogun, MK Abiodun… - … Conference, ICAI 2021 …, 2021 - Springer
In the realm of information and communication sciences, the Internet of Things (IoT) is a new
technology with sensors in the healthcare sector. Sensors are critical IoT devices that …